Impact
A flaw in the Linux kernel’s XFS subsystem causes a failure to properly handle a null return value from the xchk_scrub_create_subord function. The function was returning a malformed ENOMEM value instead of NULL, and callers were not verifying the pointer. This oversight can lead to improper memory accesses that may trigger a kernel panic, effectively denying service to the affected system.
Affected Systems
The vulnerability affects any system running a Linux kernel version that incorporates the code merged between releases 6.2 and 6.10. All distributions that ship these kernels without the specified patch are potentially impacted.
Risk and Exploitability
The CVSS base score for this issue is 7.0, indicating a high severity. However, the EPSS score is reported as less than 1 percent and the vulnerability is not listed in the CISA KEV catalog, suggesting a low current exploitation likelihood. The attack vector is likely local, requiring an attacker to trigger XFS scrub operations or otherwise invoke the affected internal function. Exploitation would result in a kernel crash rather than privilege elevation or data compromise.
OpenCVE Enrichment